Software  >   Systems Software  >   Security Software  >   Network Security Software  >   Secure Content Management Software  >  

Ad Blocker Software

RSS Feed    Add to Google    Add to My Yahoo!
Ad Blocker SoftwareWhite Papers (View All Report Types)
 
Leverage ERP for Sales and Operations Planning
sponsored by IFS
WHITE PAPER: Learn about S&OP and how your organization should leverage it to track the efforts of sales and operations over time.
Posted: 12 Aug 2014 | Published: 12 Aug 2014

IFS

Security Considerations When Undergoing a Network Refresh
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative paper discusses crucial considerations you need to keep in mind when undergoing a network refresh, outlining the impact that emerging technologies will have on network and security management, along with what you can do to ensure that your network is high-performance and secure.
Posted: 02 Jun 2014 | Published: 02 Jun 2014

Hewlett-Packard Company

Advanced Data Protection for Small and Midsized Organizations
sponsored by IBM
WHITE PAPER: Uncover the ins-and-outs of one storage solution capable of transforming data protection for small to midsized organizations.
Posted: 27 Aug 2014 | Published: 30 Apr 2014

IBM

Total Software Management
sponsored by CDW Corporation
WHITE PAPER: This important whitepaper covers how to handle software management in light of growing technology trends like the cloud.
Posted: 08 Aug 2014 | Published: 08 Apr 2014

CDW Corporation

Anti-Evasion: Why It's a Critical Component of Intrusion Prevention Systems
sponsored by Dell Software
WHITE PAPER: Sophisticated exploits that utilize advanced evasion techniques are all too common. Anti-evasion data-normalizing techniques are critical to an effective IPS, since evasions that aren't decoded and detected effectively render the IPS useless.
Posted: 12 May 2014 | Published: 12 May 2014

Dell Software

Advanced Endpoint and Server Protection
sponsored by Bit9 + Carbon Black
WHITE PAPER: In this informative white paper, gain critical insights into new strategies for protecting your organization against today's advanced cyber-attacks, including advanced heuristics, application control, and isolation technologies.
Posted: 26 Aug 2014 | Published: 26 Aug 2014

Bit9 + Carbon Black

Requirements Management Solution for Electronics
sponsored by IBM
WHITE PAPER: This informative white paper breaks down a new requirements management solution that can improve your engineering efficiency, productivity, and overall design quality.
Posted: 06 Aug 2014 | Published: 29 Jun 2013

IBM

Budgeting for Mid-Market Companies
sponsored by Prophix Software
WHITE PAPER: Uncover all the ins-and-outs of budgeting so you can achieve the most efficient financial process possible.
Posted: 03 Jun 2014 | Published: 31 Dec 2012

Prophix Software

Select the Right Solution for Inner-City Transportation Management
sponsored by IBM
WHITE PAPER: This exclusive whitepaper covers the single automated software solution many of public transportation systems are turning to and provides checklists for four key areas that will help you pick the right vendor.
Posted: 22 Jul 2014 | Published: 15 Apr 2014

IBM

Test Data Management for Security and Compliance
sponsored by EMC Corporation
WHITE PAPER: As big data continuously gets bigger, your IT organization must develop scalable new strategies to mitigate the increased risk of losing control of it. This white paper examines how test data management can play a vital role in safeguarding data privacy and ensuring regulatory compliance.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

EMC Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement